Hackers and Threats to your Mobile Enterprise

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Mobile device security overview

    Mobile device manufacturers and operating system developers vary in their security capabilities. This list evaluates how the leading mobile devices stack up in security. 

  • Protecting your corporate laptops

    In this special report, you'll discover how to protect your laptops from hackers and thieves and learn what to do if one of your corporate laptops is stolen. You'll also find information to help your employees safeguard their laptops while traveling.... 

  • Products of the Year 2005

    You are invited to submit your company's mobile product(s) to be considered for our Products of the Year awards. Winning products will be highlighted in a special feature on SearchMobileComputing.com in January 2005. 

  • When will attackers go mobile?

    Mobile malware has not been the great threat that many independent security experts have predicted, but they still predict the threat will come. 

  • Mobile viruses evolving beyond just 'nuisance'

    Mobile viruses are evolving beyond being considered a nuisance into a true threat to security, privacy and compliance. 

  • Data theft roundup: More laptops stolen, roughly 300,000 at risk

    Three stolen laptops jeopardize the personal information of former supermarket employees, customers of Hotels.com and members of the YMCA. 

  • Proof-of-concepts heighten mobile malware fears

    By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices. 

  • Security vendor says 'WiPhishing' threatens Wi-Fi users

    Network security vendor Cirond said Friday that a new danger, which it calls "WiPhishing" threatens users of laptops equipped with Wi-Fi and the companies that employ those users. 

  • Cabir cell phone risk worsens

    Some Symbian-based handsets are now at greater risk of falling prey to the Cabir worm now that new, more powerful variants popping up. Now that the source code is in the wild, experts say it could mean the dawn of a new era in cell phone viruses. 

  • Small changes can thwart WLAN hackers

    Stopping wireless intruders isn't hard, but one expert says most companies neglect the simple tasks that can keep wireless LANs secure. 

  • Mobile patching is No. 1 challenge of mobile device security

    Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. 

  • Mobile security threats

    Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile s... 

  • Smartphone security: The growing threat of mobile malware

    The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, an... 

  • Is malware coming to a smartphone near you?

    Mobile malware has grown increasingly malicious and financially motivated. In this tip, you'll learn the history of mobile malware and how it can sneak in your back door. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • war driving (access point mapping)

    War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. 

  • warchalking (war chalking)

    Warchalking is a grass roots effort to create a standard iconography for public Wi-Fi access. 

  • How can I ensure app store security for my remote users?

    Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Mobile device security overview

    Mobile device manufacturers and operating system developers vary in their security capabilities. This list evaluates how the leading mobile devices stack up in security. 

  • Mobile patching is No. 1 challenge of mobile device security

    Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. 

  • Mobile security threats

    Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile s... 

  • Smartphone security: The growing threat of mobile malware

    The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, an... 

  • Is malware coming to a smartphone near you?

    Mobile malware has grown increasingly malicious and financially motivated. In this tip, you'll learn the history of mobile malware and how it can sneak in your back door. 

  • When will attackers go mobile?

    Mobile malware has not been the great threat that many independent security experts have predicted, but they still predict the threat will come. 

  • Mobile viruses evolving beyond just 'nuisance'

    Mobile viruses are evolving beyond being considered a nuisance into a true threat to security, privacy and compliance. 

  • Protecting your corporate laptops

    In this special report, you'll discover how to protect your laptops from hackers and thieves and learn what to do if one of your corporate laptops is stolen. You'll also find information to help your employees safeguard their laptops while traveling.... 

  • See more All on Hackers and Threats to your Mobile Enterprise
About Hackers and Threats to your Mobile Enterprise

Learn how to keep mobile hackers and security threats to your mobile devices like smartphones, laptops and notebooks at bay while safeguarding your enterprise data and your mobile devices. Discover why every enterprise must be aware of the threats to your mobile device arsenal and create a secure mobile device environment that is critical to your mobile device strategy. Read how forward-thinking organizations are testing their mobile security to ensure that hackers and the threats they cause are kept at bay.